PHTN-40-000026 The Photon operating system must protect audit logs from unauthorized access.

Information

Unauthorized disclosure of audit records can reveal system and configuration data to attackers, thus compromising its confidentiality.

Audit information includes all information (e.g., audit records, audit settings, audit reports) needed to successfully audit operating system activity.

Satisfies: SRG-OS-000057-GPOS-00027, SRG-OS-000058-GPOS-00028, SRG-OS-000059-GPOS-00029

Solution

At the command line, run the following commands:

# chmod 0600 <audit log file>
# chown root:root <audit log file>

Replace <audit log file> with the target log file.

Note: If "log_group" is configured in the auditd.conf file and set to something other than "root", the permissions changes will not be persistent.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_VMW_vSphere_8-0_Y24M08_STIG.zip

Item Details

Category: AUDIT AND ACCOUNTABILITY

References: 800-53|AU-9, CAT|II, CCI|CCI-000162, CCI|CCI-000163, CCI|CCI-000164, Rule-ID|SV-258811r958434_rule, STIG-ID|PHTN-40-000026, Vuln-ID|V-258811

Plugin: Unix

Control ID: 2dd9801ac4f9307ea85f99d926c9512437691dac2c2de7e7e42fdf269e8297d0